CN102006167B - Ring signature method for anonymizing information based on algebra - Google Patents
Ring signature method for anonymizing information based on algebra Download PDFInfo
- Publication number
- CN102006167B CN102006167B CN 201010544635 CN201010544635A CN102006167B CN 102006167 B CN102006167 B CN 102006167B CN 201010544635 CN201010544635 CN 201010544635 CN 201010544635 A CN201010544635 A CN 201010544635A CN 102006167 B CN102006167 B CN 102006167B
- Authority
- CN
- China
- Prior art keywords
- ring
- signature
- public key
- ring signature
- overbar
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
Abstract
本发明公开了一种基于代数的对消息匿名环签名的方法,该方法按照以下步骤实施,生成系统参数,密钥生成,环签名生成,环签名的验证。基于传统密码体制的环签名方法,在量子计算机下其安全性受到威胁,而本发明基于多变量公钥密码体制的环签名方法解决了现有的环签名体制在量子计算下不安全的缺陷。本发明的方法既具有安全性又具有计算效率高的优点。The invention discloses an algebra-based method for signing anonymous rings of messages. The method is implemented according to the following steps: generating system parameters, generating keys, generating ring signatures, and verifying ring signatures. The security of the ring signature method based on the traditional cryptographic system is threatened under the quantum computer, but the ring signature method based on the multivariable public key cryptosystem of the present invention solves the defect that the existing ring signature system is not safe under the quantum computing. The method of the invention has the advantages of both safety and high calculation efficiency.
Description
技术领域 technical field
本发明属于信息安全技术领域,涉及一种基于代数的对消息匿名环签名的方法。The invention belongs to the technical field of information security, and relates to an algebra-based method for signing a message anonymous ring.
背景技术 Background technique
2001年,在如何匿名泄漏秘密的背景下,Rivest等人提出了一种新型签名技术,称为环签名(ring signature)。环签名可以被视为一种特殊的群签名,它没有可信中心,没有群的建立过程,这里的群是指由多个可能的签名者组成的集合,也称为环。该环的建立具有自发性,即环是由一个签名者在不需要和其它人商量的情况下建立的。对电子文档的环签名是由一个签名者代表环中全体成员签署的,但对于签名验证者来说签名者是完全匿名的。环签名提供了一种匿名泄露秘密的巧妙方法。环签名的这种无条件匿名性在对信息需要长期保护的一些特殊环境中非常有用。环签名可以实现无条件匿名,即无法追踪签名人的身份。环签名的这种无条件匿名性适用于信息需要长期保护的一些特殊环境。环签名引起了广泛关注,提出了各种环签名方案。2002年,Abe等人提出了第一个基于有限域上离散对数的环签名方案。最近,双线性对被用来设计环签名方案,然而,双线性对的运算效率很低。In 2001, under the background of how to disclose secrets anonymously, Rivest et al. proposed a new type of signature technology called ring signature. Ring signature can be regarded as a special group signature, which has no trusted center and no group establishment process. The group here refers to the set composed of multiple possible signers, also known as the ring. The establishment of the ring is spontaneous, that is, the ring is established by a signer without consulting with others. A ring signature on an electronic document is signed by a signer on behalf of all members of the ring, but the signer is completely anonymous to the signature verifier. Ring signatures provide a neat way to reveal secrets anonymously. The unconditional anonymity of ring signatures is very useful in some special environments where long-term protection of information is required. Ring signatures can achieve unconditional anonymity, that is, the identity of the signer cannot be traced. The unconditional anonymity of ring signatures is suitable for some special environments where information needs to be protected for a long time. Ring signatures have attracted widespread attention, and various ring signature schemes have been proposed. In 2002, Abe et al. proposed the first ring signature scheme based on discrete logarithms over finite fields. Recently, bilinear pairings have been used to design ring signature schemes, however, bilinear pairings are computationally inefficient.
环签名因其特有的性质,如自发性、匿名性等,使得它可以广泛地应用在匿名电子选举、机密信息的匿名泄漏、电子政务、电子商务、重要新闻的匿名发布及无线传感器网络中的匿名认证。下面简要介绍几种应用:Because of its unique properties, such as spontaneity and anonymity, ring signatures can be widely used in anonymous electronic elections, anonymous disclosure of confidential information, e-government, e-commerce, anonymous release of important news, and wireless sensor networks. Anonymous authentication. A few applications are briefly described below:
1)用于匿名泄漏信息。例如匿名举报一个官员腐败,为了防止官员的报复行为,保护举报者的隐私,举报者可以对举报电子文档进行环签名。反贪局在获得举报信息的真实性的同时还能不暴露举报者的真实身份。这时就可以使用环签名方案。1) Used to disclose information anonymously. For example, to anonymously report an official’s corruption, in order to prevent the official’s retaliation and protect the privacy of the whistleblower, the whistleblower can ring-sign the electronic file of the report. While obtaining the authenticity of the reported information, the Anti-Corruption Bureau can also not reveal the true identity of the whistleblower. At this time, the ring signature scheme can be used.
2)用于ad-hoc、无线传感器网络中的匿名认证。ad-hoc和无线传感器网络的无中心、自组织等特点与环签名的构造有很多相似之处。因此对于ad-hoc网络中的诸多问题,如:成员的匿名认证等,往往要求参与实体的一方在应用过程中能够保持自己身份的隐私性,都可以应用环签名来解决。2) It is used for anonymous authentication in ad-hoc and wireless sensor networks. There are many similarities between ad-hoc and wireless sensor networks, such as centerlessness and self-organization, and the construction of ring signatures. Therefore, for many problems in the ad-hoc network, such as anonymous authentication of members, etc., it is often required that the party participating in the application process can maintain the privacy of its own identity, and ring signatures can be used to solve them.
随着量子计算机的出现,利用量子计算机可以在多项式时间内解决因子分解和离散对数问题,进而严重威胁到现有基于传统密码体制的环签名的安全性。构造新的公钥密码体制,使其能够替代基于数论的密码体制,抵御未来基于量子计算机的攻击已经迫在眉睫。多变量公钥密码体制可以抵御量子计算机的攻击,而且比基于数论的方案在计算上更有效,因此,多变量公钥密码学的研究成为密码学发展中很活跃的课题。With the emergence of quantum computers, the use of quantum computers can solve factorization and discrete logarithm problems in polynomial time, which seriously threatens the security of existing ring signatures based on traditional cryptosystems. It is imminent to construct a new public key cryptosystem so that it can replace the cryptosystem based on number theory and resist future attacks based on quantum computers. Multivariate public-key cryptography can resist the attack of quantum computers and is more computationally efficient than schemes based on number theory. Therefore, the research on multivariate public-key cryptography has become a very active topic in the development of cryptography.
多变量公钥密码体制至今已经经历了20年的发展历程,出现了MIA族、OV族、HFE族、TTM族、MFE族、lIC族等体制。由于多变量公钥密码体制的安全性和效率更高,所以最近得到了人们的广泛关注。Multivariate public key cryptosystems have gone through 20 years of development, and MIA family, OV family, HFE family, TTM family, MFE family, IIC family and other systems have emerged. Because of its higher security and efficiency, multivariate public-key cryptosystems have recently received widespread attention.
多变量密码体制的发展为环签名的研究提供了新的思路,因为直到目前,还没有发现量子计算机对二次多变量方程组的求解有任何优势。The development of multivariate cryptosystems provides new ideas for the research of ring signatures, because until now, no quantum computer has been found to have any advantages in solving quadratic multivariate equations.
到目前为止,已经提出了各种环签名方案,但这些方案都是基于传统密码体制,例如RSA等。面对量子计算机的出现,传统密码体制受到威胁,因此,现有的环签名体制在量子计算下将不再安全。So far, various ring signature schemes have been proposed, but these schemes are all based on traditional cryptosystems, such as RSA and so on. Facing the emergence of quantum computers, the traditional cryptographic system is threatened. Therefore, the existing ring signature system will no longer be safe under quantum computing.
发明内容 Contents of the invention
本发明的目的是提供一种基于代数的对消息匿名环签名的方法,解决现有的环签名体制在量子计算下不安全的缺陷。The purpose of the present invention is to provide an algebra-based method for signing anonymous rings of messages, which solves the defect that the existing ring signature system is insecure under quantum computing.
本发明所采用的技术方案是,基于代数的对消息匿名环签名的方法,该方法按照以下步骤实施:The technical solution adopted in the present invention is an algebra-based method for signing an anonymous ring of messages, which is implemented according to the following steps:
步骤1.生成系统参数Step 1. Generate System Parameters
1)设置k=GF(q)是有限域,其中q=pl,p是一个素数,l是一个正整数;1) Setting k=GF(q) is a finite field, where q=p l , p is a prime number, and l is a positive integer;
2)令m为多变量方程组中方程的个数,n为变量的个数;2) Let m be the number of equations in the multivariate equation system, and n be the number of variables;
3)选择H:{0,1}*→kn为密码学安全的哈希函数,3) Select H: {0, 1} * →k n is a cryptographically secure hash function,
系统参数为(k,q,p,l,n,m,H);The system parameters are (k, q, p, l, n, m, H);
步骤2.密钥生成Step 2. Key generation
1)假设环中有t个用户,设为U={u0,u1,…,ut-1};1) Suppose there are t users in the ring, set U={u 0 , u 1 ,...,u t-1 };
2)选择一个安全的多变量公钥密码签名体制,根据该体制,每个用户ui(0≤i≤t-1)选择Fi是从kn到km的可逆映射,Fi满足:2) Choose a secure multi-variable public key cryptographic signature system. According to this system, each user u i (0≤i≤t-1) chooses F i as a reversible mapping from k n to k m , and F i satisfies:
a)Fi(x1,…,xn)=(fi1,…,fim),其中fij∈k[x1,…,xn],j=1,…,m;a) F i (x 1 ,...,x n )=(f i1 ,...,f im ), where f ij ∈ k[x 1 ,...,x n ], j=1,...,m;
b)任何方程b) any equation
Fi(x1,…,xn)=(y′1,…,y′m)F i (x 1 ,...,x n )=(y' 1 ,...,y' m )
都易于求解;are easy to solve;
3)每个用户ui(0≤i≤t-1)随机选择L1i是从km到km的一个可逆仿射变换3) Each user u i (0≤i≤t-1) randomly selects L 1i is an invertible affine transformation from k m to k m
L1i(x1,…,xm)=M1i·(x1,…,xm)T+a1i,L 1i (x 1 ,...,x m )=M 1i ·(x 1 ,...,x m ) T +a 1i ,
其中M1i是有限域k上的一个m×m的可逆矩阵,a1i是有限域k上的一个m×1的列向量;Where M 1i is an m×m invertible matrix on finite field k, and a 1i is an m×1 column vector on finite field k;
4)每个用户ui(0≤i≤t-1)随机选择L2i是从kn到kn的一个可逆仿射变换4) Each user u i (0≤i≤t-1) randomly selects L 2i is a reversible affine transformation from k n to k n
L2i(x1,…,xn)=M2i·(x1,…,xn)T+a2i,L 2i (x 1 ,...,x n )=M 2i ·(x 1 ,...,x n ) T +a 2i ,
其中M2i是有限域k上的一个n×n的可逆矩阵,a2i是有限域k上的一个n×1的列向量;Where M 2i is an n×n invertible matrix on finite field k, and a 2i is an n×1 column vector on finite field k;
5)每个用户ui(0≤i≤t-1)公布其公钥 5) Each user u i (0≤i≤t-1) publishes its public key
其中每一个都是k[x1,…,xn]中的多项式;each of them are all polynomials in k[x 1 ,...,x n ];
6)每个用户ui(0≤i≤t-1)保密其私钥SKi={L1i,Fi,L2i};6) Each user u i (0≤i≤t-1) keeps its private key SK i ={L 1i , F i , L 2i } secret;
7)环中的t个用户的公钥集记为 7) The public key sets of t users in the ring are denoted as
步骤3.环签名生成Step 3. Ring signature generation
设签名者uπ(0≤π≤t-1)代表环中所有成员U={u0,u1,…,ut-1}对消息M∈{0,1}*进行环签名,环中的t个用户的公钥集记为利用其私钥SKi={L1i,Fi,L2i},签名步骤如下:Let the signer u π (0≤π≤t-1) represent all members in the ring U={u 0 , u 1 ,...,u t-1 } to sign the message M∈{0, 1} * , the ring The public key set of t users in is denoted as Using its private key SK i ={L 1i , F i , L 2i }, the signature steps are as follows:
1)签名者uπ随机选取u∈kn,计算1) The signer u π randomly selects u∈k n , and calculates
2)对于i=π+1,π+2,…,t-1,0,1,…,π-1,依次随机选取si∈kn,计算2) For i=π+1, π+2, ..., t-1, 0, 1, ..., π-1, randomly select s i ∈ k n sequentially, and calculate
3)计算3) calculate
4)输出消息M关于环的环签名为4) Output message M about the ring The ring signature of is
σ=(c0,s0,s1,…,st-1);σ=(c 0 , s 0 , s 1 ,..., s t-1 );
步骤4.环签名的验证Step 4. Verification of the ring signature
给定消息M关于环的环签名σ=(c0,s0,s1,…,st-1),任何验证者对该签名正确性的验证如下:Given a message M about the ring The ring signature σ=(c 0 , s 0 , s 1 ,…, st-1 ), any verifier can verify the correctness of the signature as follows:
1)对于i=0,1,…,t-1,计算1) For i=0,1,...,t-1, calculate
2)验证ct=c0是否成立,2) Verify whether c t =c 0 holds true,
如果成立,则接受该环签名,否则,拒绝该环签名。If true, the ring signature is accepted, otherwise, the ring signature is rejected.
本发明的特点还在于,The present invention is also characterized in that,
其中步骤3中,签名者uπ随机选取u∈kn,计算 In step 3, the signer u π randomly selects u∈k n , and calculates
其中步骤3中,对于i=π+1,π+2,…,t-1,0,1,…,π-1,依次随机选取si∈kn,计算In step 3, for i=π+1, π+2, ..., t-1, 0, 1, ..., π-1, randomly select s i ∈ k n sequentially, and calculate
其中步骤3中,计算Among them, in step 3, the calculation
从而使得消息M关于环的环签名σ=(c0,s0,s1,…,st-1)构成了一个可以验证的封闭环。so that the message M about the ring The ring signature σ=(c 0 , s 0 , s 1 ,..., st-1 ) constitutes a verifiable closed ring.
基于传统密码体制的环签名方法,在量子计算机下其安全性受到威胁,而本发明基于代数的对消息匿名环签名的方法在量子计算下是安全的,本发明的方法既具有安全性又具有计算效率高的优点。The security of the ring signature method based on the traditional cryptographic system is threatened under the quantum computer, and the method of the present invention based on the algebraic anonymous ring signature of the message is safe under the quantum calculation, and the method of the present invention has both security and The advantages of high computational efficiency.
具体实施方式 Detailed ways
本发明所采用的技术方案是,基于代数的对消息匿名环签名的方法,该方法按照以下步骤实施:The technical scheme adopted in the present invention is an algebra-based method for signing the anonymous ring of messages, which is implemented according to the following steps:
步骤1.生成系统参数Step 1. Generate System Parameters
1)设置k=GF(q)是有限域,其中q=pl,p是一个素数,l是一个正整数;1) Setting k=GF(q) is a finite field, where q=p l , p is a prime number, and l is a positive integer;
2)令m为多变量方程组中方程的个数,n为变量的个数;2) Let m be the number of equations in the multivariate equation system, and n be the number of variables;
3)选择H:{0,1}*→kn为密码学安全的哈希函数,3) Select H: {0, 1} * →k n is a cryptographically secure hash function,
系统参数为(k,q,p,l,n,m,H)。The system parameters are (k, q, p, l, n, m, H).
步骤2.密钥生成Step 2. Key Generation
1)假设环中有t个用户,设为U={u0,u1,…,ut-1};1) Suppose there are t users in the ring, set U={u 0 , u 1 ,...,u t-1 };
2)选择一个安全的多变量公钥密码签名体制,根据该体制,每个用户ui(0≤i≤t-1)选择Fi是从kn到km的可逆映射,Fi满足:2) Choose a secure multi-variable public key cryptographic signature system. According to this system, each user u i (0≤i≤t-1) chooses F i as a reversible mapping from k n to k m , and F i satisfies:
a)Fi(x1,…,xn)=(fi1,…,fim),其中fij∈k[x1,…,xn],j=1,…,m;a) F i (x 1 ,...,x n )=(f i1 ,...,f im ), where f ij ∈ k[x 1 ,...,x n ], j=1,...,m;
b)任何方程b) any equation
Fi(x1,…,xn)=(y′1,…,y′m)F i (x 1 ,...,x n )=(y' 1 ,...,y' m )
都易于求解;are easy to solve;
3)每个用户ui(0≤i≤t-1)随机选择L1i是从km到km的一个可逆仿射变换3) Each user u i (0≤i≤t-1) randomly selects L 1i is an invertible affine transformation from k m to k m
L1i(x1,…,xm)=M1i·(x1,…,xm)T+a1i,L 1i (x 1 ,...,x m )=M 1i ·(x 1 ,...,x m ) T +a 1i ,
其中M1i是有限域k上的一个m×m的可逆矩阵,a1i是有限域k上的一个m×1的列向量;Where M 1i is an m×m invertible matrix on finite field k, and a 1i is an m×1 column vector on finite field k;
4)每个用户ui(0≤i≤t-1)随机选择L2i是从kn到kn的一个可逆仿射变换4) Each user u i (0≤i≤t-1) randomly selects L 2i is a reversible affine transformation from k n to k n
L2i(x1,…,xn)=M2i·(x1,…,xn)T+a2i,L 2i (x 1 ,...,x n )=M 2i ·(x 1 ,...,x n ) T +a 2i ,
其中M2i是有限域k上的一个n×n的可逆矩阵,a2i是有限域k上的一个n×1的列向量;Where M 2i is an n×n invertible matrix on finite field k, and a 2i is an n×1 column vector on finite field k;
5)每个用户ui(0≤i≤t-1)公布其公钥 5) Each user u i (0≤i≤t-1) publishes its public key
其中每一个都是k[x1,…,xn]中的多项式;each of them are all polynomials in k[x 1 ,...,x n ];
6)每个用户ui(0≤i≤t-1)保密其私钥SKi={L1i,Fi,L2i};6) Each user u i (0≤i≤t-1) keeps its private key SK i ={L 1i , F i , L 2i } secret;
7)环中的t个用户的公钥集记为 7) The public key sets of t users in the ring are denoted as
步骤3.环签名生成Step 3. Ring signature generation
设签名者uπ(0≤π≤t-1)代表环中所有成员U={u0,u1,…,ut-1}对消息M∈{0,1}*进行环签名,环中的t个用户的公钥集记为利用其私钥SKi={L1i,Fi,L2i},签名步骤如下:Let the signer u π (0≤π≤t-1) represent all members in the ring U={u 0 , u 1 ,...,u t-1 } to sign the message M∈{0, 1} * , the ring The public key set of t users in is denoted as Using its private key SK i ={L 1i , F i , L 2i }, the signature steps are as follows:
1)签名者uπ随机选取u∈kn,计算1) The signer u π randomly selects u∈k n , and calculates
2)对于i=π+1,π+2,…,t-1,0,1,…,π-1,依次随机选取si∈kn,计算2) For i=π+1, π+2, ..., t-1, 0, 1, ..., π-1, randomly select s i ∈ k n sequentially, and calculate
3)计算3) calculate
4)输出消息M关于环的环签名为4) Output message M about the ring The ring signature of is
σ=(c0,s0,s1,…,st-1)。σ=(c 0 , s 0 , s 1 , . . . , st-1 ).
步骤4.环签名的验证Step 4. Verification of the ring signature
给定消息M关于环的环签名σ=(c0,s0,s1,…,st-1),任何验证者对该签名正确性的验证如下:Given a message M about the ring The ring signature σ=(c 0 , s 0 , s 1 ,…, st-1 ), any verifier can verify the correctness of the signature as follows:
1)对于i=0,1,…,t-1,计算1) For i=0, 1, ..., t-1, calculate
2)验证ct=c0是否成立。2) Verify whether c t =c 0 holds true.
如果成立,则接受该环签名,否则,拒绝该环签名。If true, the ring signature is accepted, otherwise, the ring signature is rejected.
下面分别对本发明的基于多变量公钥密码体制的环签名的正确性、匿名性和不可伪造性进行分析:The correctness, anonymity and unforgeability of the ring signature based on the multivariable public key cryptosystem of the present invention are analyzed respectively below:
●正确性●Correctness
本发明提出的基于多变量多项式的环签名是正确的。The multivariate polynomial-based ring signature proposed by the present invention is correct.
接收方收到消息M关于环的签名σ=(c0,s0,s1,…,st-1),若该签名是按照上述步骤生成,并且在传输过程中没有改变,则有ct=c0成立。The receiver receives a message M about the ring The signature σ=(c 0 , s 0 , s 1 ,..., st-1 ), if the signature is generated according to the above steps and has not changed during transmission, then c t =c 0 holds.
证明:接收方收到消息M关于环的签名σ=(c0,s0,s1,…,st-1),若该签名是由步骤3中的环签名生成算法产生的,并且在传输过程中没有改变,则有:Proof: The receiver receives the message M about the ring The signature σ=(c 0 , s 0 , s 1 ,..., st-1 ), if the signature is generated by the ring signature generation algorithm in step 3 and has not changed during transmission, then:
因为根据签名验证过程,我们有because According to the signature verification process, we have
由此,依据签名验证过程所求的{ci}(i=0,1,…,t-1)序列与签名生成过程所得结果一致,所以ct=c0成立。Therefore, the sequence of {c i } (i=0, 1, . . . , t-1) obtained in the signature verification process is consistent with the result obtained in the signature generation process, so c t =c 0 is established.
●签名者匿名性● Signer anonymity
本发明提出的基于多变量多项式的环签名满足签名人无条件匿名性。The multivariable polynomial-based ring signature proposed by the present invention satisfies the unconditional anonymity of the signer.
证明:设攻击者得到消息M关于环的签名为σ=(c0,s0,s1,…,st-1),由于si∈kn是随机选取的,随机选取si的概率是1/qn;而u是随机选取的,随机选取u的概率也是1/qn,因而sπ也可看作是随机的,并且随机选取的概率是1/qn。因此环签名σ=(c0,s0,s1,…,st-1)中si(i∈0,1,…,t-1)的值被签名生成算法以相等的概率1/qn进行选择,且与签名者无关。因此即便是外部攻击者非法获得了所有可能的签名者的私钥,它能确定出真正的签名者的概率不超过1/t。Proof: Let the attacker get the message M about the ring The signature of σ=(c 0 , s 0 , s 1 ,..., s t-1 ), since s i ∈ k n is randomly selected, the probability of randomly selecting s i is 1/q n ; And u is randomly selected, and the probability of randomly selecting u is also 1/q n , so s π can also be regarded as random, and the probability of randomly selecting is 1/q n . Therefore, the value of s i (i∈0, 1 , …, t-1 ) in the ring signature σ=(c 0 , s 0 , s 1 ,…, st-1) is generated by the signature generation algorithm with equal probability 1/ q n makes the choice, independent of the signer. Therefore, even if an external attacker illegally obtains the private keys of all possible signers, the probability that it can determine the real signer does not exceed 1/t.
●签名不可伪造性●Signature unforgeability
本发明提出的基于多变量多项式的环签名方案关于多变量公钥密码体制(MPKC)已知攻击是不可伪造的,如果在MPKC中已知攻击下,环签名方案中所选的多变量签名体制是安全的。这里MPKC中已知攻击包括代数攻击,线性化攻击,秩攻击和差分攻击等。The multivariable polynomial-based ring signature scheme proposed by the present invention is unforgeable with respect to known attacks on the multivariate public key cryptosystem (MPKC). is safe. The known attacks in MPKC include algebraic attacks, linearization attacks, rank attacks and differential attacks.
证明:假设由生成算法生成的密钥对和公钥集发送给攻击者A。A可以利用MPKC中已知攻击,如代数攻击,线性化攻击,秩攻击,差分攻击等等。A输出(R*,M*,σ*),如果成立,攻击成功。在这个过程中,A不能询问(*,M*,σ*),并且我们现在分析A输出伪造的环签名(R*,M*,σ*)的计算复杂度。我们假设攻击者A模仿签名者uπ伪造关于环R*的环签名(R*,M*,σ*),不是一般性,假设攻击者A按照环签名生成中步骤1),2)进行计算,但是为了伪造某个消息M的签名,需要通过求得sπ,满足Proof: Assume the key pair generated by the generation algorithm and public key set sent to attacker A. A can use known attacks in MPKC, such as algebraic attack, linearization attack, rank attack, differential attack and so on. A outputs (R * , M * , σ * ), if Established, the attack was successful. During this process, A cannot ask (*, M * , σ * ), and We now analyze the computational complexity of A outputting the forged ring signature (R * , M * , σ * ). We assume that the attacker A imitates the signer u π to forge the ring signature (R * , M * , σ * ) on the ring R*, not general, assuming Attacker A calculates according to steps 1) and 2) in ring signature generation, but in order to forge the signature of a message M, it needs to obtain s π to satisfy
来伪造环签名σ=(c1,s1,s2,…,st),其中u为攻击者自己选取的。这个问题的求解属于有限域上多变量二次多项式方程组的求解问题,也是多变量公钥密码体制所基于的困难问题。目前对多变量公钥密码体制的攻击有以下几个方法:To forge the ring signature σ=(c 1 , s 1 , s 2 ,..., st t ), where u is chosen by the attacker himself. The solution of this problem belongs to the problem of solving multivariable quadratic polynomial equations over finite fields, and it is also a difficult problem on which multivariable public key cryptosystems are based. At present, there are several ways to attack the multivariate public key cryptosystem:
1)代数攻击:针对多变量公钥密码体制的代数攻击是指在不知道私钥的情况下直接从二次方程中求解密文sπ。基算法和XL算法是最有效的代数攻击方法。假如本方案中所选取的实际多变量公钥密码体制可以抵抗直接代数攻击,本发明中的环签名也可以抵抗直接代数攻击。1) Algebraic attack: The algebraic attack on the multivariate public key cryptosystem refers to directly from the quadratic equation without knowing the private key Find the decrypted text s π in . Base algorithm and XL algorithm are the most effective algebraic attack methods. If the actual multivariable public key cryptosystem selected in this scheme can resist direct algebraic attack, the ring signature in the present invention can also resist direct algebraic attack.
2)线性化方程攻击:一个线性化方程是指对给定的公钥 总有下面的等式成立:2) Linearized equation attack: A linearized equation means that for a given public key The following equation always holds:
把的具体值代入上式,我们得到sπ和vπ的一个仿射(线性)关系。假如本方案中所选取的实际多变量公钥密码体制可以抵抗利用线性化方程攻击对进行攻击,本发明中的环签名也可以抵抗线性化方程攻击。Bundle The specific value of is substituted into the above formula, and we get an affine (linear) relationship between s π and v π . If the actual multi-variable public key cryptosystem selected in this scheme can resist the attack by using the linearization equation attack, the ring signature in the present invention can also resist the linearization equation attack.
3)秩攻击:Goubin和Courtois指出最小秩攻击适用于三角-加-减体制。秩攻击的复杂度大约其中k是Fπ分量中最小秩为r的线性组合的数目。3) Rank attack: Goubin and Courtois pointed out that the minimum rank attack is applicable to the triangle-addition-subtraction scheme. The complexity of the rank attack is about where k is the number of linear combinations of minimum rank r in the components of F π .
假如本方案中所选取的实际多变量公钥密码体制可以抵抗利用最小秩攻击,则本发明中的环签名也可以抵抗最小秩攻击。If the actual multivariate public key cryptosystem selected in this scheme can resist the minimum rank attack, then the ring signature in the present invention can also resist the minimum rank attack.
4)差分攻击:给出一个多变量公钥密码体制的公钥一组二次多项式,它的差分定义为这是一组关于x的函数。关键是利用差分中的隐藏结构来攻击多变量公钥密码体制。假如本方案中所选取的实际多变量公钥密码体制可以抵抗差分攻击,则本发明中的环签名也可以抵抗差分攻击。4) Differential attack: given the public key of a multivariate public key cryptosystem A set of quadratic polynomials whose difference defined as This is a set of functions on x. The key is to exploit the hidden structure in the difference to attack the multivariate public key cryptosystem. If the actual multi-variable public key cryptosystem selected in this scheme can resist differential attack, then the ring signature in the present invention can also resist differential attack.
由以上证明知,如若我们所选取多变量公钥密码体制在现有的对MPKC攻击下是安全的,则本发明的环签名在现有的对MPKC攻击下也是安全的。From the above proofs, if the multivariate public key cryptosystem we choose is safe under existing attacks on MPKC, then the ring signature of the present invention is also safe under existing attacks on MPKC.
实施例1Example 1
基于多变量公钥密码oil-vinegar签名体制的匿名环签名方案:Anonymous ring signature scheme based on multi-variable public key cryptography oil-vinegar signature system:
步骤1.生成系统参数Step 1. Generate System Parameters
1)设置k=GF(q)是特征为p=2的有限域,其中q=28;1) Set k=GF(q) to be a finite field characterized by p=2, where q=2 8 ;
2)令o=30,v=64,m=30为多变量方程组中方程的个数,n=o+v=94为变量的个数;2) make o=30, v=64, m=30 is the number of equations in the multivariate equation system, and n=o+v=94 is the number of variables;
3)选择H:{0,1}*→k30为密码学安全的抗碰撞单向不可逆哈希函数。系统参数为(k,q,p,l,m,n,H)。3) Select H: {0, 1} * →k 30 to be a cryptographically secure anti-collision one-way irreversible hash function. The system parameters are (k, q, p, l, m, n, H).
步骤2.密钥生成Step 2. Key Generation
1)假设环中有t个用户,设为U={u0,u1,..,ut-1},1) Suppose there are t users in the ring, set U={u 0 , u 1 ,.., u t-1 },
根据多变量公钥密码体制,每个用户ui(0≤i≤t-1)随机选择Fi是从kn到km的可逆Oil-Vinegar多项式映射,Oil-Vinegar多项式具有如下形式:According to the multivariate public-key cryptosystem, each user u i (0≤i≤t-1) randomly selects F i as the reversible Oil-Vinegar polynomial mapping from k n to k m , and the Oil-Vinegar polynomial has the following form:
其中ailj,bilj,cil,dij,ei∈k;where a ilj , b ilj , c il , d ij , e i ∈ k;
2)每个用户ui(0≤i≤t-1)随机选择Li是从kn到kn的一个可逆仿射变换2) Each user u i (0≤i≤t-1) randomly selects L i as an invertible affine transformation from k n to k n
其中Mi是有限域k上的一个n×n的可逆矩阵,ai有限域k上的一个n×1的列向量;Among them, M i is an n×n invertible matrix on finite field k, and a column vector of n×1 on a i finite field k;
3)每个用户ui(0≠i≤t-1)公布其公钥 3) Each user u i (0≠i≤t-1) publishes its public key
其中每一个都是k[x1,…,xn]中的多项式;each of them are all polynomials in k[x 1 ,...,x n ];
4)每个用户ui(0≤i≤t-1)保密其私钥SKi={Fi,Li};4) Each user u i (0≤i≤t-1) keeps its private key SK i ={F i , L i } secret;
5)环中的t个用户的公钥集记为 5) The public key sets of t users in the ring are denoted as
步骤3.环签名生成Step 3. Ring signature generation
设假设成员uπ(0≤π≤t-1)代表环对消息M∈{0,1}*进行签名,uπ的公钥为私钥为SKπ={Fπ,Lπ}。签名者uπ计算环签名的步骤如下:Suppose the hypothetical member u π (0≤π≤t-1) represents the ring To sign a message M ∈ {0, 1} * , the public key of u π is The private key is SK π ={F π , L π }. The steps for the signer u π to calculate the ring signature are as follows:
1)签名者uπ随机选取u∈kn,计算1) The signer u π randomly selects u∈k n , and calculates
2)对于i=π+1,π+2,…,t-1,0,1,…,π-1,依次随机选取si∈kn,计算2) For i=π+1, π+2, ..., t-1, 0, 1, ..., π-1, randomly select s i ∈ k n sequentially, and calculate
3)计算3) calculate
随机选择以(x1,…,xo)为变量求解线性方程组random selection Solve a system of linear equations with (x 1 ,...,x o ) as variables
若该方程组无解,另外选取一个重新求解,If the system of equations has no solution, choose another re-solve,
令所求得的解为记为Let the obtained solution be recorded as
4)输出消息M关于环的环签名为4) Output message M about the ring The ring signature of is
σ=(c0,s0,s1,…,st-1)。σ=(c 0 , s 0 , s 1 , . . . , st-1 ).
步骤4.环签名的验证Step 4. Verification of the ring signature
给定消息M关于环的环签名σ=(c0,s0,s1,…,st-1),任何验证者对签名正确性的验证如下:Given a message M about the ring The ring signature σ=(c 0 , s 0 , s 1 ,..., st-1 ), any verifier can verify the correctness of the signature as follows:
1)对于i=0,1,…,t-1,计算1) For i=0,1,...,t-1, calculate
2)验证2) Verify
ct=c0 c t =c 0
是否成立。如果成立,则接受该环签名,否则,拒绝该环签名。Whether it is established. If true, the ring signature is accepted, otherwise, the ring signature is rejected.
实施例2Example 2
基于多变量公钥密码Square+签名体制的匿名环签名方案:Anonymous ring signature scheme based on multivariable public key cryptography Square+ signature system:
square+体制是基于奇特征域上的多变量多项式体制,安全性比较高,可以抵抗量子计算机的攻击,并且加密解密具有较高的效率。我们结合square+体制,提出一个基于square+体制的环签名方案。The square+ system is a multivariate polynomial system based on a singular characteristic field, which has relatively high security and can resist quantum computer attacks, and has high encryption and decryption efficiency. We combine the square+ system and propose a ring signature scheme based on the square+ system.
1.Squaare+体制的构造1. The structure of Squaare+ system
令k是一个阶为q的有限域,其中q≡3mod4。是k的n+l次扩张,其中l使得n+l为奇数。F是K到K的映射,F(X)=X2,其中X∈K。Let k be a finite field of order q, where q≡3mod4. is the n+l expansion of k, where l makes n+l odd. F is a mapping from K to K, F(X)=X 2 , where X∈K.
随机选择一个单射仿射映射L1:kn→kn+l;d个有n+l个变量的二次多项式Randomly select an injective affine map L 1 : k n →k n+l ; d quadratic polynomials with n+l variables
g1,…,gd∈k[x1,…,xn+l]g 1 ,...,g d ∈ k[x 1 ,...,x n+l ]
以及一个可逆仿射映射L2:kn+l+d→kn+l+d。φ:K→kn+l,是向量空间的同构映射:and an invertible affine map L 2 : k n+l+d → k n+l+d . φ: K→k n+l , is an isomorphic map of vector spaces:
由于φоFоφ-1是一个n+l元的二次多项式组,通过附加g1,…,gd,我们可以产生映射:Since φоFоφ -1 is a quadratic polynomial group of n+l elements, by appending g 1 ,...,g d , we can generate the mapping:
F+:kn+l-→kn+l+d F + : k n+l -→k n+l+d
我们可以构造为we can construct for
私钥:private key:
映射L1,L2,F以及F+;Map L 1 , L 2 , F and F + ;
公钥:public key:
1)有限域k及其加法和乘法结构;1) Finite field k and its addition and multiplication structures;
2)n+l+d个多项式分量 2) n+l+d polynomial components
签名生成:Signature generation:
我们可以通过下面的步骤来对消息(或者消息摘要)(y′1,y′2…,y′n+l+d)∈kn+l+d进行签名:We can sign the message (or message digest) (y′ 1 , y′ 2 ..., y′ n+l+d )∈k n+l+d through the following steps:
1)令(y1,y2,…yn+l+d)=L2 -1(y′1,y′2,…,y′n+l+d);1) Let (y 1 , y 2 ,...y n+l+d )=L 2 -1 (y′ 1 , y′ 2 ,…,y′ n+l+d );
2)移除无法混合的d个随机多项式g1,…,gd,得到(y1,y2,…,yn+l)。令2) Remove d random polynomials g 1 , ..., g d that cannot be mixed to obtain (y 1 , y 2 , ..., y n+l ). make
Y=φ-1(y1,y2,…,yn+l)∈K;Y=φ -1 (y 1 , y 2 ,..., y n+l )∈K;
3)求解X2=Y,由于q≡3mod4且n+l是奇数,使得:|K|≡3mod4,我们可以利用以下公式来求解:3) To solve X 2 =Y, since q≡3mod4 and n+l is an odd number, so that: |K|≡3mod4, we can use the following formula to solve:
这有两个解,但是由于L1是仿射的,一般来说,其中仅有一个是φ-1оL1的像,这个解在φ-1оL1下的原像就是签名(x′1,…,x′n)。There are two solutions, but since L1 is affine, in general, only one of them is the image of φ -1 оL 1 , and the preimage of this solution under φ -1 оL 1 is the signature (x′ 1 , ..., x′ n ).
签名验证:Signature Verification:
给定消息(y′1,…,y′n+l+d)的签名(x′1,…,x′n),其中j=1,…,n+l+d,计算Given a signature (x' 1 , ..., x' n ) of a message (y' 1 , ..., y' n+l+d ) , where j=1, ..., n+l+d, compute
是否成立,如果成立,接受签名(x′1,…,x′n),如果不成立,则拒绝签名(x′1,…,x′n)。Whether it is true, if true, accept the signature (x′ 1 ,…,x′ n ), if not, reject the signature (x′ 1 ,…,x′ n ).
2.基于多变量公钥密码Square+签名体制的匿名环签名方案2. Anonymous ring signature scheme based on multivariable public key cryptography Square+ signature system
步骤1.生成系统参数Step 1. Generate System Parameters
我们选择q=31,n=48,l=3,d=5,域k为F31,K是k的51次扩张。仿射映射L2:k48→k51,可逆仿射映射L1:k56→k56,因此,多变量方程组中方程的个数为m=n+l+d=56,变量的个数为n=48。系统参数为(k=F31,q=31,n=48,r=51,m=56,H),其中H:{0,1}*→k48为密码学安全的哈希函数。We choose q=31, n=48, l=3, d=5, field k is F 31 , and K is the 51 expansion of k. Affine map L 2 : k 48 →k 51 , reversible affine map L 1 : k 56 →k 56 , therefore, the number of equations in multivariate equations is m=n+l+d=56, the number of variables The number is n=48. The system parameters are (k=F 31 , q=31, n=48, r=51, m=56, H), where H: {0, 1} * →k 48 is a cryptographically secure hash function.
步骤2.密钥生成:Step 2. Key generation:
假设生成环中有t个用户,设为U={u0,u1,…,ut-1}。设用户ui的公私钥对为PKi/SKi,公钥:是square+体制中的公钥,其中,F+:k51→k56是square+体制中的映射,K是square+体制中的扩域,φ:K→k51,是向量空间的同构映射;私钥:SKi={L1i,F+,L2i},其中L2i是从k48到k51的单射仿射变换,L1i是从k56到k56的可逆仿射变换,i=0,1,…,t-1。环中的t个用户的公钥集记为
步骤3.环签名生成Step 3. Ring signature generation
设假设成员uπ(0≤π≤t-1)代表环对消息M∈{0,1}*进行签名,uπ的公钥为私钥为SKπ={K1i,F+,L2i}。签名者uπ计算环签名的步骤如下:Suppose the hypothetical member u π (0≤π≤t-1) represents the ring To sign a message M ∈ {0, 1} * , the public key of u π is The private key is SK π ={K 1i , F + , L 2i }. The steps for the signer u π to calculate the ring signature are as follows:
1)签名者uπ随机选取u∈kn,计算1) The signer u π randomly selects u∈k n , and calculates
2)对于i=π+1,π+2,…,t-1,0,1,…,π-1,依次随机选取si∈kn,计算2) For i=π+1, π+2, ..., t-1, 0, 1, ..., π-1, randomly select s i ∈ k n sequentially, and calculate
3)计算时,参照square+体制的签名生成过程,求得消息m的签名为σ=(c0,s0,s1,…,st-1);3) calculate , referring to the signature generation process of the square+ system, the signature of the message m is obtained as σ=(c 0 , s 0 , s 1 ,..., st-1 );
4)输出消息M关于环的环签名为4) Output message M about the ring The ring signature of is
σ=(c0,s0,s1,…st-1)。σ=(c 0 , s 0 , s 1 , . . . st-1 ).
步骤4.环签名的验证Step 4. Verification of the ring signature
给定消息M关于环的环签名σ=(c0,s0,s1,…,st-1),任何验证者对签名正确性的验证如下:Given a message M about the ring The ring signature σ=(c 0 , s 0 , s 1 ,..., st-1 ), any verifier can verify the correctness of the signature as follows:
1)对于i=0,1,…,t-1,计算1) For i=0,1,...,t-1, calculate
2)验证2) Verify
ct=c0 c t =c 0
是否成立。如果成立,则接受该环签名,否则,拒绝该环签名。Whether it is established. If true, the ring signature is accepted, otherwise, the ring signature is rejected.
本发明的方法提供电子文档的环数字签名,可以用来保护电子文档在发布、存储或传输中的完整性、真实性;同时,又可以保护签名者的匿名性,以保证签名用户的信息不暴露,在该签名通过验证的情况下,使签名的验证者可以确信该签名是由多个用户组成的一个环中的某个成员签名的,但是验证者不能确认该签名到底是由哪一个成员签名的,每个成员签名的概率是相等的。The method of the present invention provides ring digital signatures of electronic documents, which can be used to protect the integrity and authenticity of electronic documents in publishing, storage or transmission; at the same time, it can protect the anonymity of signers to ensure that the information of signing users Exposure, when the signature is verified, the verifier of the signature can be sure that the signature is signed by a member of a ring composed of multiple users, but the verifier cannot confirm which member the signature is Signed, each member has an equal probability of signing.
本发明利用多变量公钥密码体制在量子计算下安全的优势来解决现有环签名体制在量子计算下将不再安全的缺陷。发明的基于多变量公钥密码体制的环签名方案,满足签名者的无条件匿名性和不可伪造性,在效率上优于传统密码体制。The invention utilizes the security advantage of the multi-variable public key cryptosystem under the quantum calculation to solve the defect that the existing ring signature system will no longer be safe under the quantum calculation. The invented ring signature scheme based on the multi-variable public key cryptosystem satisfies the unconditional anonymity and unforgeability of the signer, and is superior to the traditional cryptosystem in terms of efficiency.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201010544635 CN102006167B (en) | 2010-11-11 | 2010-11-11 | Ring signature method for anonymizing information based on algebra |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201010544635 CN102006167B (en) | 2010-11-11 | 2010-11-11 | Ring signature method for anonymizing information based on algebra |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102006167A CN102006167A (en) | 2011-04-06 |
CN102006167B true CN102006167B (en) | 2013-03-13 |
Family
ID=43813261
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 201010544635 Expired - Fee Related CN102006167B (en) | 2010-11-11 | 2010-11-11 | Ring signature method for anonymizing information based on algebra |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102006167B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102006168B (en) * | 2010-11-11 | 2013-03-13 | 西安理工大学 | Ring signature method for anonymizing information based on multivariate digital signature |
CN109831306B (en) * | 2019-01-15 | 2021-08-31 | 如般量子科技有限公司 | Anti-quantum computation ring signature method and system based on multiple key pools |
CN110932866B (en) * | 2019-11-26 | 2021-07-20 | 武汉大学 | A Ring Signature Generation Method Based on SM2 Digital Signature Algorithm |
CN114938282B (en) * | 2022-07-22 | 2022-12-30 | 中国科学技术大学 | Threshold group signature method and device based on multidimensional quantum system and electronic equipment |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101305544A (en) * | 2005-11-08 | 2008-11-12 | 松下电器产业株式会社 | Authentication system, signature generation device, signature verification device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE60318073T2 (en) * | 2002-07-29 | 2008-12-11 | International Business Machines Corp. | GROUP SIGNATURE SCHEME |
-
2010
- 2010-11-11 CN CN 201010544635 patent/CN102006167B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101305544A (en) * | 2005-11-08 | 2008-11-12 | 松下电器产业株式会社 | Authentication system, signature generation device, signature verification device |
Non-Patent Citations (1)
Title |
---|
王尚平等.基于双线性对的可证明安全的环签名和代理环签名.《计算机工程与应用》.2006,(第08期),107-109. * |
Also Published As
Publication number | Publication date |
---|---|
CN102006167A (en) | 2011-04-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102006166B (en) | Ring signature method for anonymizing information based on multivariate polynomial | |
CN102006165B (en) | Ring signature method for anonymizing information based on multivariate public key cryptography | |
CN104023044A (en) | Cloud-storage data lightweight-level public auditing method with privacy protection | |
CN101834724A (en) | A public key authentication encryption method and digital signature method | |
CN102811125A (en) | Certificateless multi-receiver signcryption method based on multivariate cryptosystem | |
Zhang et al. | White-box implementation of the identity-based signature scheme in the IEEE P1363 standard for public key cryptography | |
He et al. | An efficient certificateless designated verifier signature scheme. | |
Chow et al. | Escrowed linkability of ring signatures and its applications | |
Ch et al. | Efficient signcryption schemes based on hyperelliptic curve cryptosystem | |
CN106209377B (en) | Multivariable-based proxy re-signature method capable of resisting conspiracy attacks | |
Wang et al. | Ring signature scheme based on multivariate public key cryptosystems | |
Tian et al. | Secure limitation analysis of public-key cryptography for smart card settings | |
CN102006168A (en) | Ring signature method for anonymizing information based on multivariate digital signature | |
CN102006167B (en) | Ring signature method for anonymizing information based on algebra | |
Hwang et al. | A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation. | |
Shim | Design principles of secure certificateless signature and aggregate signature schemes for IoT environments | |
CN102006170B (en) | Ring signature method for anonymizing information based on MQ problem in finite field | |
Yang et al. | Certificateless universal designated verifier signature schemes | |
CN102006169A (en) | Ring signature method for anonymizing information based on secondary multivariate problem in finite field | |
Chen et al. | Blockchain as a CA: A provably secure signcryption scheme leveraging blockchains | |
Yang et al. | Improving an efficient ID-based RSA multisignature | |
Chen et al. | An escrow-free hierarchical identity-based signature scheme from composite order bilinear groups | |
Wang | Signer‐admissible strong designated verifier signature from bilinear pairings | |
Sun et al. | A secure and efficient e-Cheque protocol from chameleon hash function | |
Benrebbouh et al. | Enhancing Security and Authentication in IoT-based Energy Internet using Post-Quantum Blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20130313 Termination date: 20151111 |
|
EXPY | Termination of patent right or utility model |